CVE-2022-24086 (GCVE-0-2022-24086)

Vulnerability from cvelistv5 – Published: 2022-02-16 16:38 – Updated: 2025-10-21 23:15
VLAI? CISA
Summary
Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.
CWE
  • CWE-20 - Improper Input Validation (CWE-20)
Assigner
References
Impacted products
Vendor Product Version
Adobe Magento Commerce Affected: unspecified , ≤ 2.4.3-p1 (custom)
Affected: unspecified , ≤ 2.3.7-p2 (custom)
Affected: unspecified , ≤ None (custom)
Create a notification for this product.
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog

Date added: 2022-02-15

Due date: 2022-03-01

Required action: Apply updates per vendor instructions.

Used in ransomware: Unknown

Notes: https://nvd.nist.gov/vuln/detail/CVE-2022-24086

Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:59:23.565Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://helpx.adobe.com/security/products/magento/apsb22-12.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2022-24086",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-27T18:35:53.490758Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2022-02-15",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-24086"
              },
              "type": "kev"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T23:15:46.117Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "references": [
          {
            "tags": [
              "government-resource"
            ],
            "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-24086"
          }
        ],
        "timeline": [
          {
            "lang": "en",
            "time": "2022-02-15T00:00:00+00:00",
            "value": "CVE-2022-24086 added to CISA KEV"
          }
        ],
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Magento Commerce",
          "vendor": "Adobe",
          "versions": [
            {
              "lessThanOrEqual": "2.4.3-p1",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "2.3.7-p2",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            },
            {
              "lessThanOrEqual": "None",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-02-13T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "Improper Input Validation (CWE-20)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-16T16:38:28.000Z",
        "orgId": "078d4453-3bcd-4900-85e6-15281da43538",
        "shortName": "adobe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://helpx.adobe.com/security/products/magento/apsb22-12.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Adobe Commerce checkout improper input validation leads to remote code execution",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@adobe.com",
          "DATE_PUBLIC": "2022-02-13T23:00:00.000Z",
          "ID": "CVE-2022-24086",
          "STATE": "PUBLIC",
          "TITLE": "Adobe Commerce checkout improper input validation leads to remote code execution"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Magento Commerce",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_value": "2.4.3-p1"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "2.3.7-p2"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "None"
                          },
                          {
                            "version_affected": "\u003c=",
                            "version_value": "None"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Adobe"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "userInteraction": "None",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Improper Input Validation (CWE-20)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://helpx.adobe.com/security/products/magento/apsb22-12.html",
              "refsource": "MISC",
              "url": "https://helpx.adobe.com/security/products/magento/apsb22-12.html"
            }
          ]
        },
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "078d4453-3bcd-4900-85e6-15281da43538",
    "assignerShortName": "adobe",
    "cveId": "CVE-2022-24086",
    "datePublished": "2022-02-16T16:38:28.383Z",
    "dateReserved": "2022-01-27T00:00:00.000Z",
    "dateUpdated": "2025-10-21T23:15:46.117Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "cisa_known_exploited": {
      "cveID": "CVE-2022-24086",
      "cwes": "[\"CWE-20\"]",
      "dateAdded": "2022-02-15",
      "dueDate": "2022-03-01",
      "knownRansomwareCampaignUse": "Unknown",
      "notes": "https://nvd.nist.gov/vuln/detail/CVE-2022-24086",
      "product": "Commerce and Magento Open Source",
      "requiredAction": "Apply updates per vendor instructions.",
      "shortDescription": "Adobe Commerce and Magento Open Source contain an improper input validation vulnerability which can allow for arbitrary code execution.",
      "vendorProject": "Adobe",
      "vulnerabilityName": "Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability"
    },
    "fkie_nvd": {
      "cisaActionDue": "2022-03-01",
      "cisaExploitAdd": "2022-02-15",
      "cisaRequiredAction": "Apply updates per vendor instructions.",
      "cisaVulnerabilityName": "Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability",
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.3.0\", \"matchCriteriaId\": \"90B19F1A-11A1-4315-8433-6B8938228BF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*\", \"versionStartExcluding\": \"2.3.3\", \"versionEndIncluding\": \"2.3.6\", \"matchCriteriaId\": \"F5229EE3-4D7C-473B-AEDA-7FC6CC75486B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.4.0\", \"versionEndIncluding\": \"2.4.2\", \"matchCriteriaId\": \"6DFFF83C-2A52-442D-8349-7B37843B630F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F471E19-8AFE-4A6C-88EA-DF94428518F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*\", \"matchCriteriaId\": \"27E5B990-1E1C-46AC-815F-AF737D211C16\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B503C35-8C90-4A24-8E60-722CDBBF556B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A453C85-A14A-47B8-B91D-3906BBE42A78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*\", \"versionEndExcluding\": \"2.3.0\", \"matchCriteriaId\": \"4839E061-1E2C-47BE-9FF7-7D6EE17085E1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*\", \"versionStartExcluding\": \"2.3.3\", \"versionEndIncluding\": \"2.3.6\", \"matchCriteriaId\": \"768F5B14-76BE-4BF6-80F0-C35386B0C61F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:magento:magento:*:*:*:*:commerce:*:*:*\", \"versionStartIncluding\": \"2.4.0\", \"versionEndIncluding\": \"2.4.2\", \"matchCriteriaId\": \"664A23B2-48D1-46E8-BA7F-3F693C19D5CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:magento:magento:2.3.7:p1:*:*:commerce:*:*:*\", \"matchCriteriaId\": \"0F954F97-00FF-4ADC-A185-ACF0513C5294\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:magento:magento:2.3.7:p2:*:*:commerce:*:*:*\", \"matchCriteriaId\": \"E4798194-5488-4DB5-8427-0AFDDD8F4D0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:magento:magento:2.4.3:-:*:*:commerce:*:*:*\", \"matchCriteriaId\": \"A573FBD1-29A3-4601-B0FA-AFEF953C05E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:magento:magento:2.4.3:p1:*:*:commerce:*:*:*\", \"matchCriteriaId\": \"9D138592-62B8-458A-9B95-9E05FDA8D63A\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.\"}, {\"lang\": \"es\", \"value\": \"Adobe Commerce versiones 2.4.3-p1 (y anteriores) y 2.3.7-p2 (y anteriores), est\\u00e1n afectadas por una vulnerabilidad de comprobaci\\u00f3n de entrada inapropiada durante el proceso de compra. Una explotaci\\u00f3n de este problema no requiere la interacci\\u00f3n del usuario y podr\\u00eda resultar en una ejecuci\\u00f3n de c\\u00f3digo arbitrario\"}]",
      "id": "CVE-2022-24086",
      "lastModified": "2024-11-21T06:49:46.937",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@adobe.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2022-02-16T17:15:13.307",
      "references": "[{\"url\": \"https://helpx.adobe.com/security/products/magento/apsb22-12.html\", \"source\": \"psirt@adobe.com\", \"tags\": [\"Patch\", \"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://helpx.adobe.com/security/products/magento/apsb22-12.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Release Notes\", \"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@adobe.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"psirt@adobe.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-24086\",\"sourceIdentifier\":\"psirt@adobe.com\",\"published\":\"2022-02-16T17:15:13.307\",\"lastModified\":\"2025-10-23T14:51:16.013\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Adobe Commerce versiones 2.4.3-p1 (y anteriores) y 2.3.7-p2 (y anteriores), est\u00e1n afectadas por una vulnerabilidad de comprobaci\u00f3n de entrada inapropiada durante el proceso de compra. Una explotaci\u00f3n de este problema no requiere la interacci\u00f3n del usuario y podr\u00eda resultar en una ejecuci\u00f3n de c\u00f3digo arbitrario\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2022-02-15\",\"cisaActionDue\":\"2022-03-01\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Adobe Commerce and Magento Open Source Improper Input Validation Vulnerability\",\"weaknesses\":[{\"source\":\"psirt@adobe.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.3.0\",\"matchCriteriaId\":\"90B19F1A-11A1-4315-8433-6B8938228BF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.3.3\",\"versionEndIncluding\":\"2.3.6\",\"matchCriteriaId\":\"CE057011-26D8-4298-8D24-624CCD26F014\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndIncluding\":\"2.4.2\",\"matchCriteriaId\":\"6DFFF83C-2A52-442D-8349-7B37843B630F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F471E19-8AFE-4A6C-88EA-DF94428518F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.3.7:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"27E5B990-1E1C-46AC-815F-AF737D211C16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B503C35-8C90-4A24-8E60-722CDBBF556B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:commerce:2.4.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A453C85-A14A-47B8-B91D-3906BBE42A78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*\",\"versionEndExcluding\":\"2.3.0\",\"matchCriteriaId\":\"67B41B1F-86FE-43A9-BE12-42F15F47446A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*\",\"versionStartExcluding\":\"2.3.3\",\"versionEndIncluding\":\"2.3.6\",\"matchCriteriaId\":\"9F0EBEC1-B55D-40FE-A649-969D7B2F5BA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:*:*:*:*:open_source:*:*:*\",\"versionStartIncluding\":\"2.4.0\",\"versionEndIncluding\":\"2.4.2\",\"matchCriteriaId\":\"59C7EB66-4DC7-40E5-AEA5-605A930E09EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.3.7:p1:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"B8BEB5B9-87A6-466B-AEA3-516025219219\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.3.7:p2:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"E8A5A54D-A2B8-4D3F-9F02-A8D60BFD52A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.3:-:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"45FD678B-59DE-4F05-8BB3-A02F5EBA7414\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:adobe:magento:2.4.3:p1:*:*:open_source:*:*:*\",\"matchCriteriaId\":\"431F341D-81A0-439F-B6D8-898E55FC1780\"}]}]}],\"references\":[{\"url\":\"https://helpx.adobe.com/security/products/magento/apsb22-12.html\",\"source\":\"psirt@adobe.com\",\"tags\":[\"Patch\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://helpx.adobe.com/security/products/magento/apsb22-12.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-24086\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://helpx.adobe.com/security/products/magento/apsb22-12.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T03:59:23.565Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-24086\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-27T18:35:53.490758Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-02-15\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-24086\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2022-02-15T00:00:00+00:00\", \"value\": \"CVE-2022-24086 added to CISA KEV\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-04T19:03:23.776Z\"}}], \"cna\": {\"title\": \"Adobe Commerce checkout improper input validation leads to remote code execution\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Adobe\", \"product\": \"Magento Commerce\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.4.3-p1\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"2.3.7-p2\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"None\"}]}], \"datePublic\": \"2022-02-13T00:00:00.000Z\", \"references\": [{\"url\": \"https://helpx.adobe.com/security/products/magento/apsb22-12.html\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"Improper Input Validation (CWE-20)\"}]}], \"providerMetadata\": {\"orgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"shortName\": \"adobe\", \"dateUpdated\": \"2022-02-16T16:38:28.000Z\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"scope\": \"Unchanged\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"Network\", \"baseSeverity\": \"Critical\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"High\", \"userInteraction\": \"None\", \"attackComplexity\": \"Low\", \"availabilityImpact\": \"High\", \"privilegesRequired\": \"None\", \"confidentialityImpact\": \"High\"}}, \"source\": {\"discovery\": \"EXTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"2.4.3-p1\", \"version_affected\": \"\u003c=\"}, {\"version_value\": \"2.3.7-p2\", \"version_affected\": \"\u003c=\"}, {\"version_value\": \"None\", \"version_affected\": \"\u003c=\"}, {\"version_value\": \"None\", \"version_affected\": \"\u003c=\"}]}, \"product_name\": \"Magento Commerce\"}]}, \"vendor_name\": \"Adobe\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://helpx.adobe.com/security/products/magento/apsb22-12.html\", \"name\": \"https://helpx.adobe.com/security/products/magento/apsb22-12.html\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Improper Input Validation (CWE-20)\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2022-24086\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Adobe Commerce checkout improper input validation leads to remote code execution\", \"ASSIGNER\": \"psirt@adobe.com\", \"DATE_PUBLIC\": \"2022-02-13T23:00:00.000Z\"}}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2022-24086\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T18:48:17.280Z\", \"dateReserved\": \"2022-01-27T00:00:00.000Z\", \"assignerOrgId\": \"078d4453-3bcd-4900-85e6-15281da43538\", \"datePublished\": \"2022-02-16T16:38:28.383Z\", \"assignerShortName\": \"adobe\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…